You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-simulations.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -794,7 +794,7 @@ All actions on existing simulations start on the **Simulations** tab. To go ther
794
794
795
795
You can copy an existing simulation and modify it to suit your needs. This action saves time and effort when you create new simulations based on previous ones.
796
796
797
-
You can copy any simulation that's available in the **Simulations** tab, regardless of the **Status** value. When you copy the simulation, you can change the setting in the new copy of the simulation. For example, change the simulation name, description, technique, payload, and target users.
797
+
You can copy any simulation that's available in the **Simulations** tab, regardless of the **Status** value. When you copy the simulation, you can change the setting in the new copy of the simulation. For example, change the simulation name, description, technique, payload, and target users.
798
798
799
799
- We don't recommend copying **Failed** simulations, because the reasons for failure could recur in the copied simulation.
800
800
- When you copy a simulation, the most recent settings are used in the copy (for example, the payload, landing page, and end-user notifications). If any content is deleted, you're prompted to select the respective content again.
@@ -808,7 +808,7 @@ To copy a simulation, do the following steps:
808
808
809
809
1. On the **Simulations** tab at <https://security.microsoft.com/attacksimulator?viewid=simulations>, find and select the simulation to copy by selecting the check box next to the name.
810
810
2. Select the :::image type="icon" source="media/m365-cc-sc-copy-icon.png" border="false"::: **Copy simulation** action that appears on the tab.
811
-
3. The simulation wizard opens with all the settings from the original simulation. The default simulation name on the **Name simulation** page is the original name plus the the suffix **_Copy**.
811
+
3. The simulation wizard opens with all the settings from the original simulation. The default simulation name on the **Name simulation** page is the original name plus the suffix **_Copy**.
812
812
4. Review and modify the simulation configuration as needed. Select **Submit** to launch it or **Save and close** to review it later. If you select **Cancel**, the copied simulation isn't saved.
813
813
814
814
### Cancel simulations
@@ -825,7 +825,7 @@ After you cancel the simulation, the **Status** value changes to **Canceled**.
825
825
- Cancelling a simulation with the **Status** value **Scheduled** results in 100% cancellation. No training assignment messages or notifications are sent, and the campaign is fully ended.
826
826
- Cancelling a simulation with the **Status** value **In progress** has the following results:
827
827
- Simulation delivery continues to the target users.
828
-
- If you cancel the simulation after a training assignment, the training assignments are still shown as due, but subsequent training reminders are cancelled.
828
+
- If you cancel the simulation after a training assignment, the training assignments are still shown as due, but subsequent training reminders are canceled.
829
829
- If you cancel the simulation before a training assignment, the trainings aren't assigned and no training assignment notifications are sent.
830
830
- Users who already received the simulated phishing message experience the following results:
831
831
- For social engineering techniques that use phishing links (all except **Malware Attachment**), the links are deactivated. Selecting the link displays the following message:
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
41
41
42
42
## August 2024
43
43
44
-
- (Preview) You can now run [simulations](attack-simulation-training-simulations.md) with QR code payloads in [Attack simulation training](attack-simulation-training-get-started.md). You can track user repsonses and assign training to end users.
44
+
- (Preview) You can now run [simulations](attack-simulation-training-simulations.md) with QR code payloads in [Attack simulation training](attack-simulation-training-get-started.md). You can track user responses and assign training to end users.
45
45
46
46
-[Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Microsoft 365 and Outlook 2021 now support the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
47
47
@@ -77,7 +77,7 @@ For more information on what's new with other Microsoft Defender security produc
77
77
- Submit messages to Microsoft.
78
78
- Trigger investigations.
79
79
- Block entries in the Tenant Allow/Block List.
80
-
- Actions are contextual based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
80
+
- Actions are contextually based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
81
81
- For 101 or more messages selected, only email purge and propose remediation options are available.
82
82
83
83
> [!TIP]
@@ -97,7 +97,7 @@ For more information on what's new with other Microsoft Defender security produc
97
97
## January 2024
98
98
99
99
-**New training modules available in Attack Simulation Training**: Teach your users to recognize and protect themselves against QR code phishing attacks. For more information, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/train-your-users-to-be-more-resilient-against-qr-code-phishing/ba-p/4022667).
100
-
-**Providing intent while submitting is now generally available**: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analysis of admin submitted messages (email and Microsoft Teams), URLs, and email attachments is further streamlined and results in a more accurate analysis. [Learn more](submissions-admin.md).
100
+
-**Providing intent while submitting is now generally available**: Admins can identify if they're submitting an item to Microsoft for a second opinion or they're submitting the message because it's malicious and was missed by Microsoft. With this change, Microsoft analyses of admin submitted messages (email and Microsoft Teams), URLs, and email attachments are further streamlined and results in a more accurate analysis. [Learn more](submissions-admin.md).
101
101
102
102
## December 2023
103
103
@@ -264,7 +264,7 @@ For more information on what's new with other Microsoft Defender security produc
264
264
## August 2021
265
265
266
266
-[Admin review for reported messages](submissions-admin-review-user-reported-messages.md): Admins can now send templated messages back to end users after they review reported messages. The templates can be customized for your organization and based on your admin's verdict as well.
267
-
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow entries are added to the Tenant Allow/Block List. In most cases, the allows are added to give the system some time and allow it naturally, if warranted. In some cases, Microsoft manages the allow for you. For more information, see:
267
+
- You can now add allow entries to the Tenant Allow/Block List if the blocked message was submitted as part of the admin submission process. Depending on the nature of the block, the submitted URL, file, and/or sender allow entries are added to the Tenant Allow/Block List. In most cases, the allows entries are added to give the system some time and allow it naturally, if warranted. In some cases, Microsoft manages the allow entries for you. For more information, see:
268
268
-[Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft)
269
269
-[Report good email attachments to Microsoft](submissions-admin.md#report-good-email-attachments-to-microsoft)
270
270
-[Report good email to Microsoft](submissions-admin.md#report-good-email-to-microsoft)
0 commit comments